US20090063689A1 - Method and system for provisioning customer premises equipment - Google Patents
Method and system for provisioning customer premises equipment Download PDFInfo
- Publication number
- US20090063689A1 US20090063689A1 US12/204,605 US20460508A US2009063689A1 US 20090063689 A1 US20090063689 A1 US 20090063689A1 US 20460508 A US20460508 A US 20460508A US 2009063689 A1 US2009063689 A1 US 2009063689A1
- Authority
- US
- United States
- Prior art keywords
- communication device
- entity
- network
- link
- method defined
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 79
- 238000004891 communication Methods 0.000 claims abstract description 171
- 238000013475 authorization Methods 0.000 claims description 23
- 238000013507 mapping Methods 0.000 claims description 12
- 230000015654 memory Effects 0.000 claims description 9
- 238000012545 processing Methods 0.000 claims description 6
- 230000003287 optical effect Effects 0.000 claims description 5
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 claims description 4
- 229910052802 copper Inorganic materials 0.000 claims description 4
- 239000010949 copper Substances 0.000 claims description 4
- 239000000835 fiber Substances 0.000 claims description 4
- 230000004044 response Effects 0.000 claims description 4
- 230000004913 activation Effects 0.000 description 19
- 230000008569 process Effects 0.000 description 10
- 230000006870 function Effects 0.000 description 7
- 238000012384 transportation and delivery Methods 0.000 description 3
- 238000009434 installation Methods 0.000 description 2
- 206010035148 Plague Diseases 0.000 description 1
- 241000607479 Yersinia pestis Species 0.000 description 1
- 230000009849 deactivation Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000013439 planning Methods 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2854—Wide area networks, e.g. public data networks
- H04L12/2856—Access arrangements, e.g. Internet access
- H04L12/2869—Operational details of access network equipments
- H04L12/2898—Subscriber equipments
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0806—Configuration setting for initial configuration or provisioning, e.g. plug-and-play
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0892—Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
Definitions
- the present invention relates generally to providing access to a public data network such as the Internet and, more particularly, to a method and system for provisioning customer premises equipment to allow access to such a network.
- Internet access is an example of a service that can be provided by a service provider to its customers.
- the service provider creates an account for a given customer, including account credentials to be used when accessing the Internet.
- the service provider ships a modem or other communication device to the customer and provides the customer with the account credentials; the service provider also records a hardware identifier of the modem in association with the customer.
- the modem Upon receipt and installation of the modem by the customer, the modem is powered on, and the modem contacts service provider equipment at a default location (which may be hard coded in the modem).
- the service provider equipment recognizes the hardware identifier of the modem as being associated with the service provider.
- the service provider then requires the customer to enter the account credentials before allowing access to the Internet via a gateway, edge router or other form of switch.
- a first broad aspect of the present invention seeks to provide a method for execution by at least one entity in a service provider network.
- the method comprises receiving an access request from a communication device; determining a logical identifier intended for use by the communication device during an eventual communication session; identifying, based on the logical identifier, an object linked to a physical location of the communication device; and obtaining account credentials for a customer known to be associated with said object.
- a second broad aspect of the present invention seeks to provide a computer-readable medium comprising computer-readable program code which, when interpreted by at least one computing apparatus in a service provider network, causes the at least one computing apparatus to execute a method.
- the computer-readable program code comprises first computer-readable program code for causing the computing apparatus to be attentive to receipt of an access request from a communication device; second computer-readable program code for causing the computing apparatus to determine a logical identifier intended for use by the communication device during an eventual communication session; third computer-readable program code for causing the computing apparatus to identify, based on the logical identifier, an object linked to a physical location of the communication device; and fourth computer-readable program code for causing the computing apparatus to obtain account credentials for a customer known to be associated with said object.
- a third broad aspect of the present invention seeks to provide at least one network entity in a service provider network, comprising means for receiving an access request from a communication device; means for determining a logical identifier intended for use by the communication device during an eventual communication session; means for identifying, based on the logical identifier, an object linked to a physical location of the communication device; and means for obtaining account credentials for a customer known to be associated with said object.
- a fourth broad aspect of the present invention seeks to provide a service provider network, which comprises a first entity and a second entity.
- the first entity is configured to receive an access request from a communication device; and determine a logical identifier intended for use by the communication device during an eventual communication session.
- the second entity is configured to identify, based on the logical identifier, an object linked to a physical location of the communication device; and obtain account credentials for a customer known to be associated with said object.
- a fifth broad aspect of the present invention seeks to provide a method for execution by customer premises equipment.
- the method comprises transmitting an access request to a network entity over a communication link; obtaining account credentials over the communication link during a configuration session established with a walled garden entity; transmitting the account credentials to the network entity over the communication link; and establishing a communication session with a gateway, the gateway having been previously associated with the account credentials.
- a sixth broad aspect of the present invention seeks to provide a computer-readable medium comprising computer-readable program code which, when interpreted by a computing apparatus, causes the computing apparatus to execute a method.
- the computer-readable program code comprises first computer-readable program code for causing the computing apparatus to transmit an access request to a network entity over a communication link; second computer-readable program code for causing the computing apparatus to obtain account credentials over the communication link during a configuration session established with a walled garden entity; third computer-readable program code for causing the computing apparatus to transmit the account credentials to the network entity over the communication link; and fourth computer-readable program code for causing the computing apparatus to establish a communication session with a gateway, the gateway having been previously associated with the account credentials.
- a seventh broad aspect of the present invention seeks to provide customer premises equipment, comprising a memory and a processing unit.
- the processing unit is configured to transmit an access request to a network entity over a communication link; obtain account credentials over the communication link during a configuration session established with a walled garden entity; store the account credentials in the memory; transmit the account credentials to the network entity over the communication link; and establish a communication session with a gateway, the gateway having been previously associated with the account credentials.
- An eighth broad aspect of the present invention seeks to provide customer premises equipment, comprising means for transmitting an access request to a network entity over a communication link; means for obtaining account credentials over the communication link during a configuration session established with a walled garden entity; means for storing the account credentials in the memory; means for transmitting the account credentials to the network entity over the communication link; and means for establishing a communication session with a gateway, the gateway having been previously associated with the account credentials.
- a ninth broad aspect of the present invention seeks to provide a method for execution by at least one entity in a service provider network.
- the method comprises receiving an access request from a communication device; determining a logical identifier intended for use by the communication device during an eventual communication session; identifying, based on said logical identifier, an object linked to a physical location of the communication device; and establishing a data session between the communication device and a network entity associated with said object.
- a tenth broad aspect of the present invention seeks to provide a computer-readable medium comprising computer-readable program code which, when interpreted by at least one computing apparatus in a service provider network, causes the at least one computing apparatus to execute a method.
- the computer-readable program code comprises first computer-readable program code for causing the computing apparatus to be attentive to receipt of an access request from a communication device; second computer-readable program code for causing the computing apparatus to determine a logical identifier intended for use by the communication device during an eventual communication session; third computer-readable program code for causing the computing apparatus to identify, based on said logical identifier, an object linked to a physical location of the communication device; and fourth computer-readable program code for causing the computing apparatus to establish a data session between the communication device and a network entity associated with said object.
- An eleventh broad aspect of the present invention seeks to provide at least one network entity in a service provider network, comprising means for being attentive to receipt of an access request from a communication device; means for determining a logical identifier intended for use by the communication device during an eventual communication session; means for identifying, based on said logical identifier, an object linked to a physical location of the communication device; and means for establishing a data session between the communication device and a network entity associated with said object.
- a twelfth broad aspect of the present invention seeks to provide a service provider network comprising a first entity and a second entity.
- the first entity is configured to receive an access request from a communication device and determine a logical identifier intended for use by the communication device during an eventual communication session.
- the second entity is configured to identify, based on the logical identifier, an object linked to a physical location of the communication device and establish a data session between the communication device and a network entity associated with said object.
- FIG. 1 shows an architecture for delivery of communication services to a customer associated with a customer premises, in accordance with a non-limiting embodiment of the present invention.
- FIG. 2 shows, within the architecture of FIG. 1 , shipping of customer premises equipment to the customer for installation at the customer premises.
- FIG. 3 shows, within the architecture of FIG. 1 , issuance of an access request by the customer premises equipment.
- FIGS. 4A and 4B show identification of a logical identifier to be used by the customer premises equipment and two alternative ways of engaging the customer premises in a configuration session with an activation entity in a service provider network.
- FIG. 5 shows the configuration session established pursuant to either FIG. 4A or FIG. 4B .
- FIG. 6 shows, within the architecture of FIG. 1 , issuance of a second access request by the customer premises equipment.
- FIGS. 7A and 7B show identification of a logical identifier to be used by the customer premises equipment and two alternative ways of engaging the customer premises in the data session with a gateway to a public data network.
- FIG. 8 shows the data session established pursuant to either FIG. 7A or FIG. 7B .
- FIG. 1 there is shown an architecture for delivery of communication services to be enjoyed by a customer ABC associated with a customer premises 100 .
- the customer premises 100 is located at a “service point location” (such as a civic address, a set of geo-coordinates, etc.), which is in this case the civic address “12 Main Street”.
- Customer ABC is a customer of a service provider, which operates a service provider network 140 and also provides access to a public data network 170 such as the Internet.
- the service provider operates a network access server 130 that allows a connection to be established between customer premises equipment (not shown) at the customer premises 100 and either the service provider network 140 or the public data network 170 .
- the public data network 170 may be reachable via the service provider network 140 rather than directly via the network access server 130 .
- the network access server 130 can be connected to the customer premises 100 in a variety of ways.
- the network access server 130 is connected to an access node 110 , which leads to the customer premises 100 (as well as to other customer premises—not shown) via a physical link 105 , such as a copper twisted pair, cable, fiber, fixed wireless, free-space optical, etc.
- the access node 110 can be implemented as a digital subscriber line access multiplexer (DSLAM) with a plurality of ports, each port connected to a different physical link.
- DSLAM digital subscriber line access multiplexer
- a database 120 stores a mapping between ports of the DSLAM 110 and associated service point locations, such as an association between port P 1 and the civic address “12 Main Street”.
- the database 120 may be populated and maintained by an operation support system (OSS) 115 , which represents a collection of systems that perform management, inventory, engineering, planning, repair and other functions for the service provider.
- OSS operation support system
- the DSLAM 110 is connected to the network access server 130 via a set of logical links. More specifically, each of the ports of the DSLAM 110 that leads to a given service point location is associated with a respective one of the logical links. In the specific non-limiting example illustrated in FIG. 1 , port P 1 is associated with a logical link 125 .
- a database 135 stores a mapping between the ports of the DSLAM 110 and associated logical links, such as a mapping between port P 1 and logical link 125 .
- the database 135 may be populated by the DSLAM 110 itself, or by the OSS 115 .
- the logical links can be permanent virtual circuits (PVCs) or virtual local area networks (VLANs), to name a few non-limiting possibilities.
- the DSLAM 110 may not be present.
- the aforesaid logical link 125 such as a VLAN or PVC
- the aforesaid logical link 125 extends all the way to the customer premises 100 .
- communication established over the logical link 125 is still destined to reach the service point location of the customer premises 100 .
- DSLAM port P 1 and/or logical link 125 represent an “object” linked to the physical location of the customer premises 100 (i.e., a location-linked object), and which allows communication to be established with the customer premises equipment 200 at that location.
- the location-linked object could be physical (as in the case of a DSLAM port) or logical (as in the case of a VLAN or PVC). Still other examples of a location-linked object will now become apparent to those of ordinary skill in the art without departing from the scope of the present invention.
- the service provider also operates a configuration entity 145 , which is responsible for assisting in configuration of customer premises equipment that may be used by various customers, including customer ABC. Further details regarding operation of the configuration entity 145 will be given later on. For the time being, it should simply be appreciated that the configuration entity 145 is accessible by the network access server 130 via the service provider network 140 .
- the service provider further operates an authorization entity 160 , which is responsible for processing “access requests” received along the logical links (including logical link 125 ).
- An “access request” comprises a message or collection of messages specifying a set of account credentials, which may or may not be valid and, if valid, may be a set of “default” credentials or a set of “customer account” credentials.
- the authorization entity 160 has access to a database 165 that stores a mapping between sets of account credentials and associated network entities.
- the network entity associated with a given set of account credentials is the entity responsible for managing a communication session initiated following an access request that specifies the given set of account credentials.
- Examples of network entities that may be responsible for managing a communication session initiated following an access request that specifies a particular set of account credentials include entities (such as a gateway 175 ) that are connected to the public data network 170 and allow full or partial access thereto, as well as entities (such as the configuration entity 145 ) that perform specific functions within a corresponding sub-region of the service provider network 140 (sometimes referred to as a “walled garden”).
- the database 165 stores an association between a set of “default” credentials and the configuration entity 145 . This means that a communication session initiated following an access request that specifies the set of default credentials is to be managed by the configuration entity 145 . It should be appreciated that the contents of the database 165 may be updated in a dynamic fashion as new sets of valid credentials are added, deleted or changed, and/or as changes occur to the network entities with which certain ones of the sets of credentials are associated.
- the service provider also operates an activation entity 155 , which is responsible for directly or indirectly interacting with customers in order to allow service activation, service deactivation and service changes for individual customers, including customer ABC.
- the activation entity 155 may comprise or connect to a customer service computer system or online portal.
- the activation entity 155 is also connected to the configuration entity 145 , either directly (as illustrated) or via the service provider network 140 .
- the activation entity 155 has access to the database 165 , either directly (as illustrated) or via the service provider network 140 .
- the activation entity 155 has access to a database 150 that stores various information for each customer, namely a service point location, a DSLAM port and, ultimately, a set of account credentials.
- the database 150 stores the civic address “12 Main Street” for customer ABC.
- port P 1 of the DSLAM 110 is included in the database 120 in association with customer ABC. (It should be appreciated that in order to associate customer ABC with port P 1 of the DSLAM 110 , one can simply consult the database 120 based on customer ABC's civic address “12 Main Street”.)
- customer ABC places an order for a service requiring customer premises equipment such as a modem or other communication device. This can be done through an order processing function of the activation entity 155 . More specifically, customer ABC (residing at the civic address “12 Main Street”) contacts the service provider to subscribe to a given service requiring customer premises equipment. With reference now to FIG. 2 , the outcome of customer ABC having contacted the service provider may be for the activation entity 155 to assign a set of customer account credentials to customer ABC and thus to associate this set of customer account credentials to customer ABC in the database 150 . In the specific non-limiting example of FIG. 2 , the set of customer account credentials is denoted “XYZ”.
- the set of customer account credentials can be associated with corresponding access permissions.
- the access permissions associated with the set of customer account credentials “XYZ” allow full access to the public data network 170 , which is accessed via the gateway 175 .
- the activation entity 155 updates the database 165 accessed by the authorization entity 160 so that the set of customer account credentials “XYZ” will be associated with the configuration entity 145 . This means that a communication session initiated following an access request that specifies the set of customer credentials “XYZ” is to be managed by the gateway 175 .
- the order processing function of the activation entity 155 may cause a modem or other customer premises equipment 200 to be shipped to customer ABC's civic address (i.e., “12 Main Street”).
- the customer premises equipment 200 may be pre-programmed with the default set of credentials mentioned above and, if necessary, with information allowing the customer premises equipment 200 to locate the network access server 130 .
- the customer premises equipment 200 Upon receipt at the customer premises 100 , the customer premises equipment 200 is installed and powered on.
- a computing device 215 may be connected to the customer premises equipment 200 in order to allow customer ABC to enjoy the various communication services provided by the service provider.
- the customer premises equipment 200 is described as having been shipped by the service provider to customer ABC's civic address (in this case, “12 Main Street”), in other non-limiting embodiments, the customer premises equipment 200 may be obtained from another source (or may already be at the customer premises 100 when customer ABC places the order). In such cases, it will be assumed for the present purposes that the customer premises equipment 200 is capable of being programmed with the set of default credentials mentioned above and, if necessary, with information allowing the customer premises equipment 200 to locate the network access server 130 .
- the configuration process includes the customer premises equipment 200 issuing an access request 300 comprising the set of default credentials mentioned above (and which may have been programmed by the service provider prior to shipping).
- the access request 300 may be formulated as one or more messages.
- the access request 300 reaches the DSLAM 110 (more specifically, port P 1 ) over the physical link 105 , and then reaches the network access server 130 over logical link 125 .
- the network access server 130 is operable to relay the set of default credentials comprised in the access request 300 to the authorization entity 160 in the form of a message 325 .
- the message 325 may be sent in accordance with a variety of protocols, including but not limited to RADIUS (Remote Authentication Dial In User Service). It should be understood that although the message 325 may have a different format from the access request 300 , it may nevertheless still be considered an access request in the generic sense of the expression.
- the authorization entity 160 which may be implemented in hardware, software, control logic or a combination thereof, implements a process that may comprise execution of background tasks, which can be interrupted under various circumstances. For example, in order to service the message 325 from the network access server 130 , the authorization entity 160 may execute the following steps.
- the authorization entity 160 consults the database 165 based on the set of credentials in the message 325 in order to identify the entity responsible for managing a communication session initiated following the access request 300 (which can be the gateway 175 , the configuration entity 145 or another “walled garden” gateway). Communication between the authorization entity 160 and the database 165 may take place using a variety of protocols, including but not limited to LDAP (Lightweight Directory Access Protocol).
- LDAP Lightweight Directory Access Protocol
- the set of credentials in the message 325 corresponds to the set of default credentials and therefore, according to the database 165 , the entity responsible for managing a communication session initiated following the access request 300 is the configuration entity 145 .
- the authorization entity 160 selects a logical identifier to be used by equipment for communication over logical link 125 (over which the access request 300 was received) during an eventual communication session.
- the authorization entity 160 may involve another entity in the selection of this logical identifier.
- the selected logical identifier may be an Internet Protocol (IP) address, for example, such as an Ipv4 or Ipv6 address.
- IP Internet Protocol
- the selected logical identifier may be a VLAN tag. In the specific non-limiting example illustrated in FIG. 3 , the selected logical identifier is 192.100.100.100.
- a database 305 is provided that stores a mapping that relates logical links to logical identifiers selected to be used by equipment for communication over those logical links (such as, in this example, the relationship between logical link 125 and logical identifier 192.100.100.100).
- the database 305 may be accessible to the authorization entity 160 and/or to the network access server 130 . It should be appreciated that selection of the logical identifier for use by equipment for communication over logical link 125 can be effected in a variety of ways, including selection from a pool 315 of available logical identifiers. Other implementations are of course possible.
- a given logical identifier is associated with a given logical link, it becomes possible to go one step further and associate that logical identifier with a DSLAM port, which is uniquely associated with a known service point location.
- the information stored in the database 305 is combined with the information stored in the database 135 , one obtains an association between logical identifiers and ports of the DSLAM 110 .
- This association or mapping can be stored in a location information database (LID) 310 .
- the location information database 310 stores an association between IP address 192.100.100.100 and DSLAM port P 1 .
- the location information database 310 is accessible to the configuration entity 145 for future use as will be described herein below. It should be appreciated that the location information database 310 may be created and maintained in a dynamic and transparent fashion, such that it always contains the most up-to-date information regarding the association between logical identifiers and DSLAM ports for specific service point locations.
- a “configuration session” is established between the customer premises equipment 200 and the entity whose identity was learned by having consulted the database 165 (in this case, the configuration entity 145 ).
- the authorization entity 160 sends a first message 400 to the customer premises equipment 200 to inform the customer premises equipment 200 of the logical identifier selected for use by equipment for communication over logical link 125 (in this case, 192.100.100.100).
- the authorization entity 160 sends a second message 405 to the configuration entity 145 to inform the configuration entity 145 of the logical identifier being used by the customer premises equipment 200 (in this case, 192.100.100.100), and thereby to engage it in communication with the customer premises equipment 200 .
- the customer premises equipment 200 sends a second message 410 to the configuration entity 145 to engage it in communication with the customer premises equipment 200 .
- a configuration session 500 is thus established between the customer premises equipment 200 and the configuration entity 145 .
- the configuration entity 145 then consults the location information database 310 based on the logical identifier being used by the customer premises equipment 200 , in order to obtain from the location information database 310 the identity of the associated DSLAM port. In the specific non-limiting example of FIG. 5 , the configuration entity 145 consults the location information database 310 based on the logical identifier 192.100.100.100 in order to obtain from the location information database 310 the identity of port P 1 of the DSLAM 110 .
- the configuration entity 145 can perform a two-step process to obtain the same information, namely by accessing the database 305 based on the logical identifier 192.100.100.100 in order to obtain the identity of logical link 125 , and then by accessing the database 135 based on the identity of logical link 125 in order to obtain the identity of port P 1 of the DSLAM 110 .
- the configuration entity 145 sends a message to the activation entity 155 that specifies the identity of port P 1 .
- the activation entity 155 consults the database 150 in order to identify the customer associated with port P 1 of the DSLAM 110 .
- the activation entity 155 determines that customer ABC is associated with port P 1 of the DSLAM 110 .
- the activation entity 155 obtains from the database 150 the set of customer account credentials “XYZ” associated with customer ABC.
- the activation entity 155 formulates a response message specifying the set of customer account credentials “XYZ”.
- the configuration entity 145 sends its contents (i.e., the set of customer account credentials “XYZ”) to the customer premises equipment 200 as part of the configuration session 500 .
- the configuration process now terminates.
- the customer premises equipment 200 Upon receipt of the set of customer account credentials “XYZ”, the customer premises equipment 200 stores it in memory and uses it to make a second access request while the customer premises equipment 200 is still powered on. The result is now described with reference to FIG. 6 .
- the customer premises equipment 200 issues a second access request 600 comprising the set of customer account credentials “XYZ” stored at the customer premises equipment 200 and received during the configuration session 500 .
- issuance of the second access request 600 can be triggered by the customer ABC (by virtue of accessing Internet using the computing device 215 ) or by the customer premises equipment 200 .
- the second access request 600 reaches the DSLAM 110 (more specifically, port P 1 ) over the physical link 105 , and then reaches the network access server 130 over logical link 125 .
- the network access server 130 is operable to relay the set of customer account credentials “XYZ” comprised in the second access request 600 to the authorization entity 160 in the form of a message 605 .
- the message 605 may be sent in accordance with a variety of protocols, including but not limited to RADIUS. Also, it should be understood that although the message 605 may have a different format from the second access request 600 , it may nevertheless still be considered an access request in the generic sense of the expression.
- the authorization entity 160 Upon receipt of the query message 605 , the authorization entity 160 consults the database 165 based on the set of credentials in the message 605 in order to identify the entity responsible for managing a communication session initiated following the second access request 600 (which, it is recalled, can be the gateway 175 , the configuration entity 145 or another “walled garden” gateway). In the specific non-limiting example illustrated in FIG.
- the set of credentials in the message 605 corresponds to the customer account credentials “XYZ” and therefore, according to the database 165 , the entity responsible for managing a communication session initiated following the second access request 600 is the gateway 175 to the public data network 170 .
- the authorization entity 160 may then assign (or may involve another entity in the assignment of) a new logical identifier to logical link 125 over which the second access request 600 was received.
- the new logical identifier is stored in the database 305 in association with logical link 125 .
- the same logical identifier as before in this case, 192.100.100.100
- the previous step is not necessary.
- a new logical identifier is indeed selected to be used by equipment for communication over logical link 125 (which is itself associated with DSLAM port P 1 ), then the association between such new logical identifier and port P 1 can be automatically updated in the location information database 310 .
- a “data session” is established between the customer premises equipment 200 and the entity whose identity was learned by having consulted the database 165 (in this case, the gateway 175 ).
- the authorization entity 160 can send a first message 700 to the customer premises equipment 200 to inform the customer premises equipment 200 of the logical identifier selected to be used by equipment for communication over logical link 125 . Where the selected logical address has not changed, the previous step may not be required.
- the authorization entity 160 sends a second message 705 to the gateway 175 to inform the gateway 175 of the logical identifier being used by the customer premises equipment 200 (in this case, 192.100.100.100), and thereby to engage it in communication with the customer premises equipment 200 .
- the gateway 175 of the logical identifier being used by the customer premises equipment 200 (in this case, 192.100.100.100), and thereby to engage it in communication with the customer premises equipment 200 .
- the customer premises equipment 200 sends a second message 710 to the gateway 175 to engage it in communication with the customer premises equipment 200 .
- a data session 800 is thus established between the customer premises equipment 200 and the gateway 175 .
- customer ABC is not asked to enter the set of customer account credentials “XYZ”, as these are obtained by the customer premises equipment 200 automatically as part of the configuration session 500 , and stored at the customer premises equipment 200 for later use.
- this process does not make it less secure.
- a malicious user who would intercept the customer premises equipment 200 .
- Such a user would still not be able to gain access to the public data network 170 because the set of customer account credentials “XYZ” required to access the public data network 170 are derived from the service provider's own pre-determined knowledge of which service point location is connected to which DSLAM port.
- any modem connected to the physical link 105 leading to port P 1 of the DSLAM 110 could be made to function seamlessly from 12 Main Street, provided it were initially programmed with the aforementioned set of default credentials.
- Recognition of this feature now allows customer ABC to employ third party customer premises equipment (e.g., a modem could be purchased from a source other than the service provider).
- a modem would obtain the user account credentials for customer ABC merely by being connected to the service point location known by the service provider to be associated with customer ABC.
- any type of access request whether it contain a set of default credentials, a set of invalid credentials or no credentials at all, can be mapped in database 165 to an associated network entity, specifically the authentication entity 145 .
- the result would be the same, namely that the configuration session 500 would be established between the customer premises equipment 200 and the authentication entity 145 , and the set of customer account credentials “XYZ” would be transmitted to the customer premises equipment 200 over the configuration session 500 for transmission by the customer premises equipment 200 as part of the second access request 600 .
- the two-step process described above involving (1) the first access request 300 (which, it has been established above, may or may not contain the set of default credentials) that causes establishment of the configuration session 500 over which are exchanged the set of customer account credentials “XYZ” and (2) the second access request 600 that sends back the set of customer account credentials “XYZ” for establishment of the data session 800 , can be reduced to a one-step process with the same end effect of allowing the customer premises equipment 200 to access a desired resource such as the public data network 170 .
- the configuration session 500 and the delivery of the customer account credentials “XYZ” over the configuration session 500 , can be dispensed with.
- the authentication entity 160 or an entity on behalf thereof can still be involved, as previously described, in the selection of a logical identifier (e.g., IP address) to be used by the equipment for communication over the logical link 125 (over which the access request was received).
- a logical identifier e.g., IP address
- groups of two or more of the various network entities may be collocated in a single physical component or piece of equipment.
- the functionality of individual ones of the various network entities may be distributed over two or more physical components or pieces of equipment.
- the various network entities may be implemented using pre-programmed hardware or firmware elements (e.g., application specific integrated circuits (ASICs), electrically erasable programmable read-only memories (EEPROMs), etc.), or other related components.
- ASICs application specific integrated circuits
- EEPROMs electrically erasable programmable read-only memories
- some or all of the functionality of the various network entities may be achieved using a computing apparatus that has access to a code memory (not shown) which stores computer-readable program code for operation of the computing apparatus, in which case the computer-readable program code could be stored on a medium which is fixed, tangible and readable directly by the various network entities, (e.g., removable diskette, CD-ROM, ROM, fixed disk, USB drive), or the computer-readable program code could be stored remotely but transmittable to the various network entities via a modem or other interface device (e.g., a communications adapter) connected to a network (including, without limitation, the Internet) over a transmission medium, which may be either a non-wireless medium (e.g., optical or analog communications lines) or a wireless medium (e.g., microwave, infrared or other transmission schemes) or a combination thereof.
- a non-wireless medium e.g., optical or analog communications lines
- a wireless medium e.g., microwave, infrared or other transmission schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
- The present invention relates generally to providing access to a public data network such as the Internet and, more particularly, to a method and system for provisioning customer premises equipment to allow access to such a network.
- Internet access is an example of a service that can be provided by a service provider to its customers. In a typical scenario, the service provider creates an account for a given customer, including account credentials to be used when accessing the Internet. The service provider then ships a modem or other communication device to the customer and provides the customer with the account credentials; the service provider also records a hardware identifier of the modem in association with the customer. Upon receipt and installation of the modem by the customer, the modem is powered on, and the modem contacts service provider equipment at a default location (which may be hard coded in the modem). The service provider equipment recognizes the hardware identifier of the modem as being associated with the service provider. For security purposes, to confirm that the modem is indeed being operated by the customer, the service provider then requires the customer to enter the account credentials before allowing access to the Internet via a gateway, edge router or other form of switch.
- One problem that plagues service providers is that customers are frequently inconvenienced by having to enter their account credentials when the modem is initially powered on or after every factory reset. In addition, it also happens that the service provider may send a replacement modem to the customer in response to the customer noticing that the modem that they had previously ordered did not yet arrive. In this case, when shipping the replacement modem, the service provider records the hardware identifier of the replacement modem in association with the customer. However, if the original modem is ultimately received by the customer before the replacement modem, and is installed, then when its hardware identifier is provided to the service provider equipment at the default location, this hardware identifier will not be recognized as being associated with the customer because the hardware identifier currently associated with the customer is the hardware identifier of the replacement modem. In short, the customer could be denied access to the Internet because the original modem was used instead of the replacement modem, which can lead to further frustration on the part of the customer, in fact adding to the frustration that may have led to a request for the replacement modem in the first place.
- Thus, there exists a need in the industry to alleviate the above difficulties when regulating a customer's access to a public data network and maintain an accurate customer-to-modem association.
- A first broad aspect of the present invention seeks to provide a method for execution by at least one entity in a service provider network. The method comprises receiving an access request from a communication device; determining a logical identifier intended for use by the communication device during an eventual communication session; identifying, based on the logical identifier, an object linked to a physical location of the communication device; and obtaining account credentials for a customer known to be associated with said object.
- A second broad aspect of the present invention seeks to provide a computer-readable medium comprising computer-readable program code which, when interpreted by at least one computing apparatus in a service provider network, causes the at least one computing apparatus to execute a method. The computer-readable program code comprises first computer-readable program code for causing the computing apparatus to be attentive to receipt of an access request from a communication device; second computer-readable program code for causing the computing apparatus to determine a logical identifier intended for use by the communication device during an eventual communication session; third computer-readable program code for causing the computing apparatus to identify, based on the logical identifier, an object linked to a physical location of the communication device; and fourth computer-readable program code for causing the computing apparatus to obtain account credentials for a customer known to be associated with said object.
- A third broad aspect of the present invention seeks to provide at least one network entity in a service provider network, comprising means for receiving an access request from a communication device; means for determining a logical identifier intended for use by the communication device during an eventual communication session; means for identifying, based on the logical identifier, an object linked to a physical location of the communication device; and means for obtaining account credentials for a customer known to be associated with said object.
- A fourth broad aspect of the present invention seeks to provide a service provider network, which comprises a first entity and a second entity. The first entity is configured to receive an access request from a communication device; and determine a logical identifier intended for use by the communication device during an eventual communication session. The second entity is configured to identify, based on the logical identifier, an object linked to a physical location of the communication device; and obtain account credentials for a customer known to be associated with said object.
- A fifth broad aspect of the present invention seeks to provide a method for execution by customer premises equipment. The method comprises transmitting an access request to a network entity over a communication link; obtaining account credentials over the communication link during a configuration session established with a walled garden entity; transmitting the account credentials to the network entity over the communication link; and establishing a communication session with a gateway, the gateway having been previously associated with the account credentials.
- A sixth broad aspect of the present invention seeks to provide a computer-readable medium comprising computer-readable program code which, when interpreted by a computing apparatus, causes the computing apparatus to execute a method. The computer-readable program code comprises first computer-readable program code for causing the computing apparatus to transmit an access request to a network entity over a communication link; second computer-readable program code for causing the computing apparatus to obtain account credentials over the communication link during a configuration session established with a walled garden entity; third computer-readable program code for causing the computing apparatus to transmit the account credentials to the network entity over the communication link; and fourth computer-readable program code for causing the computing apparatus to establish a communication session with a gateway, the gateway having been previously associated with the account credentials.
- A seventh broad aspect of the present invention seeks to provide customer premises equipment, comprising a memory and a processing unit. The processing unit is configured to transmit an access request to a network entity over a communication link; obtain account credentials over the communication link during a configuration session established with a walled garden entity; store the account credentials in the memory; transmit the account credentials to the network entity over the communication link; and establish a communication session with a gateway, the gateway having been previously associated with the account credentials.
- An eighth broad aspect of the present invention seeks to provide customer premises equipment, comprising means for transmitting an access request to a network entity over a communication link; means for obtaining account credentials over the communication link during a configuration session established with a walled garden entity; means for storing the account credentials in the memory; means for transmitting the account credentials to the network entity over the communication link; and means for establishing a communication session with a gateway, the gateway having been previously associated with the account credentials.
- A ninth broad aspect of the present invention seeks to provide a method for execution by at least one entity in a service provider network. The method comprises receiving an access request from a communication device; determining a logical identifier intended for use by the communication device during an eventual communication session; identifying, based on said logical identifier, an object linked to a physical location of the communication device; and establishing a data session between the communication device and a network entity associated with said object.
- A tenth broad aspect of the present invention seeks to provide a computer-readable medium comprising computer-readable program code which, when interpreted by at least one computing apparatus in a service provider network, causes the at least one computing apparatus to execute a method. The computer-readable program code comprises first computer-readable program code for causing the computing apparatus to be attentive to receipt of an access request from a communication device; second computer-readable program code for causing the computing apparatus to determine a logical identifier intended for use by the communication device during an eventual communication session; third computer-readable program code for causing the computing apparatus to identify, based on said logical identifier, an object linked to a physical location of the communication device; and fourth computer-readable program code for causing the computing apparatus to establish a data session between the communication device and a network entity associated with said object.
- An eleventh broad aspect of the present invention seeks to provide at least one network entity in a service provider network, comprising means for being attentive to receipt of an access request from a communication device; means for determining a logical identifier intended for use by the communication device during an eventual communication session; means for identifying, based on said logical identifier, an object linked to a physical location of the communication device; and means for establishing a data session between the communication device and a network entity associated with said object.
- A twelfth broad aspect of the present invention seeks to provide a service provider network comprising a first entity and a second entity. The first entity is configured to receive an access request from a communication device and determine a logical identifier intended for use by the communication device during an eventual communication session. The second entity is configured to identify, based on the logical identifier, an object linked to a physical location of the communication device and establish a data session between the communication device and a network entity associated with said object.
- These and other aspects and features of the present invention will now become apparent to those of ordinary skill in the art upon review of the following description of specific embodiments of the invention in conjunction with the accompanying drawings.
-
FIG. 1 shows an architecture for delivery of communication services to a customer associated with a customer premises, in accordance with a non-limiting embodiment of the present invention. -
FIG. 2 shows, within the architecture ofFIG. 1 , shipping of customer premises equipment to the customer for installation at the customer premises. -
FIG. 3 shows, within the architecture ofFIG. 1 , issuance of an access request by the customer premises equipment. -
FIGS. 4A and 4B show identification of a logical identifier to be used by the customer premises equipment and two alternative ways of engaging the customer premises in a configuration session with an activation entity in a service provider network. -
FIG. 5 shows the configuration session established pursuant to eitherFIG. 4A orFIG. 4B . -
FIG. 6 shows, within the architecture ofFIG. 1 , issuance of a second access request by the customer premises equipment. -
FIGS. 7A and 7B show identification of a logical identifier to be used by the customer premises equipment and two alternative ways of engaging the customer premises in the data session with a gateway to a public data network. -
FIG. 8 shows the data session established pursuant to eitherFIG. 7A orFIG. 7B . - With reference to
FIG. 1 , there is shown an architecture for delivery of communication services to be enjoyed by a customer ABC associated with acustomer premises 100. Thecustomer premises 100 is located at a “service point location” (such as a civic address, a set of geo-coordinates, etc.), which is in this case the civic address “12 Main Street”. Customer ABC is a customer of a service provider, which operates aservice provider network 140 and also provides access to apublic data network 170 such as the Internet. Furthermore, the service provider operates anetwork access server 130 that allows a connection to be established between customer premises equipment (not shown) at thecustomer premises 100 and either theservice provider network 140 or thepublic data network 170. In some cases, thepublic data network 170 may be reachable via theservice provider network 140 rather than directly via thenetwork access server 130. - The
network access server 130 can be connected to thecustomer premises 100 in a variety of ways. In the specific non-limiting example illustrated inFIG. 1 , thenetwork access server 130 is connected to anaccess node 110, which leads to the customer premises 100 (as well as to other customer premises—not shown) via aphysical link 105, such as a copper twisted pair, cable, fiber, fixed wireless, free-space optical, etc. In a specific non-limiting embodiment, theaccess node 110 can be implemented as a digital subscriber line access multiplexer (DSLAM) with a plurality of ports, each port connected to a different physical link. In the specific non-limiting example illustrated inFIG. 1 , one of the ports of the DSLAM 110, denoted P1, is connected to thephysical link 105 that leads to thecustomer premises 100. Adatabase 120 stores a mapping between ports of theDSLAM 110 and associated service point locations, such as an association between port P1 and the civic address “12 Main Street”. Thedatabase 120 may be populated and maintained by an operation support system (OSS) 115, which represents a collection of systems that perform management, inventory, engineering, planning, repair and other functions for the service provider. - The
DSLAM 110 is connected to thenetwork access server 130 via a set of logical links. More specifically, each of the ports of theDSLAM 110 that leads to a given service point location is associated with a respective one of the logical links. In the specific non-limiting example illustrated inFIG. 1 , port P1 is associated with alogical link 125. Adatabase 135 stores a mapping between the ports of theDSLAM 110 and associated logical links, such as a mapping between port P1 andlogical link 125. Thedatabase 135 may be populated by theDSLAM 110 itself, or by theOSS 115. In specific non-limiting embodiments, the logical links can be permanent virtual circuits (PVCs) or virtual local area networks (VLANs), to name a few non-limiting possibilities. - In other embodiments of the present invention, the
DSLAM 110 may not be present. For example, consider the case where in the absence of a DSLAM the aforesaid logical link 125 (such as a VLAN or PVC) extends all the way to thecustomer premises 100. Even under this scenario, communication established over thelogical link 125 is still destined to reach the service point location of thecustomer premises 100. Thus, it can be said that DSLAM port P1 and/orlogical link 125 represent an “object” linked to the physical location of the customer premises 100 (i.e., a location-linked object), and which allows communication to be established with thecustomer premises equipment 200 at that location. The location-linked object could be physical (as in the case of a DSLAM port) or logical (as in the case of a VLAN or PVC). Still other examples of a location-linked object will now become apparent to those of ordinary skill in the art without departing from the scope of the present invention. - In accordance with an embodiment of the present invention, the service provider also operates a
configuration entity 145, which is responsible for assisting in configuration of customer premises equipment that may be used by various customers, including customer ABC. Further details regarding operation of theconfiguration entity 145 will be given later on. For the time being, it should simply be appreciated that theconfiguration entity 145 is accessible by thenetwork access server 130 via theservice provider network 140. - The service provider further operates an
authorization entity 160, which is responsible for processing “access requests” received along the logical links (including logical link 125). An “access request” comprises a message or collection of messages specifying a set of account credentials, which may or may not be valid and, if valid, may be a set of “default” credentials or a set of “customer account” credentials. In order to assist in performing its functions, theauthorization entity 160 has access to adatabase 165 that stores a mapping between sets of account credentials and associated network entities. The network entity associated with a given set of account credentials is the entity responsible for managing a communication session initiated following an access request that specifies the given set of account credentials. Examples of network entities that may be responsible for managing a communication session initiated following an access request that specifies a particular set of account credentials include entities (such as a gateway 175) that are connected to thepublic data network 170 and allow full or partial access thereto, as well as entities (such as the configuration entity 145) that perform specific functions within a corresponding sub-region of the service provider network 140 (sometimes referred to as a “walled garden”). - In the specific non-limiting example illustrated in
FIG. 1 , thedatabase 165 stores an association between a set of “default” credentials and theconfiguration entity 145. This means that a communication session initiated following an access request that specifies the set of default credentials is to be managed by theconfiguration entity 145. It should be appreciated that the contents of thedatabase 165 may be updated in a dynamic fashion as new sets of valid credentials are added, deleted or changed, and/or as changes occur to the network entities with which certain ones of the sets of credentials are associated. - The service provider also operates an
activation entity 155, which is responsible for directly or indirectly interacting with customers in order to allow service activation, service deactivation and service changes for individual customers, including customer ABC. To this end, theactivation entity 155 may comprise or connect to a customer service computer system or online portal. Theactivation entity 155 is also connected to theconfiguration entity 145, either directly (as illustrated) or via theservice provider network 140. Furthermore, theactivation entity 155 has access to thedatabase 165, either directly (as illustrated) or via theservice provider network 140. - In order to assist in performing its functions, the
activation entity 155 has access to adatabase 150 that stores various information for each customer, namely a service point location, a DSLAM port and, ultimately, a set of account credentials. In the specific non-limiting example illustrated inFIG. 1 , thedatabase 150 stores the civic address “12 Main Street” for customer ABC. Also, port P1 of theDSLAM 110 is included in thedatabase 120 in association with customer ABC. (It should be appreciated that in order to associate customer ABC with port P1 of theDSLAM 110, one can simply consult thedatabase 120 based on customer ABC's civic address “12 Main Street”.) - In the example of
FIG. 1 , it has been assumed that customer ABC has not yet placed an order for a service that requires the use of customer premises equipment. For this reason, no customer premises equipment is illustrated inFIG. 1 and also there is no information in thedatabase 150 regarding any account credentials for customer ABC. - However, consider now the case where customer ABC places an order for a service requiring customer premises equipment such as a modem or other communication device. This can be done through an order processing function of the
activation entity 155. More specifically, customer ABC (residing at the civic address “12 Main Street”) contacts the service provider to subscribe to a given service requiring customer premises equipment. With reference now toFIG. 2 , the outcome of customer ABC having contacted the service provider may be for theactivation entity 155 to assign a set of customer account credentials to customer ABC and thus to associate this set of customer account credentials to customer ABC in thedatabase 150. In the specific non-limiting example ofFIG. 2 , the set of customer account credentials is denoted “XYZ”. - Depending on the service ordered by customer ABC, the set of customer account credentials can be associated with corresponding access permissions. In the present example, the access permissions associated with the set of customer account credentials “XYZ” allow full access to the
public data network 170, which is accessed via thegateway 175. Thus, theactivation entity 155 updates thedatabase 165 accessed by theauthorization entity 160 so that the set of customer account credentials “XYZ” will be associated with theconfiguration entity 145. This means that a communication session initiated following an access request that specifies the set of customer credentials “XYZ” is to be managed by thegateway 175. - At this stage, the order processing function of the
activation entity 155 may cause a modem or othercustomer premises equipment 200 to be shipped to customer ABC's civic address (i.e., “12 Main Street”). Thecustomer premises equipment 200 may be pre-programmed with the default set of credentials mentioned above and, if necessary, with information allowing thecustomer premises equipment 200 to locate thenetwork access server 130. Upon receipt at thecustomer premises 100, thecustomer premises equipment 200 is installed and powered on. Acomputing device 215 may be connected to thecustomer premises equipment 200 in order to allow customer ABC to enjoy the various communication services provided by the service provider. - Although the
customer premises equipment 200 is described as having been shipped by the service provider to customer ABC's civic address (in this case, “12 Main Street”), in other non-limiting embodiments, thecustomer premises equipment 200 may be obtained from another source (or may already be at thecustomer premises 100 when customer ABC places the order). In such cases, it will be assumed for the present purposes that thecustomer premises equipment 200 is capable of being programmed with the set of default credentials mentioned above and, if necessary, with information allowing thecustomer premises equipment 200 to locate thenetwork access server 130. - Turning now to
FIG. 3 , thecustomer premises equipment 200 undergoes a configuration process, which can occur at power-up, with or without triggering by customer ABC. The configuration process includes thecustomer premises equipment 200 issuing anaccess request 300 comprising the set of default credentials mentioned above (and which may have been programmed by the service provider prior to shipping). Theaccess request 300 may be formulated as one or more messages. Theaccess request 300 reaches the DSLAM 110 (more specifically, port P1) over thephysical link 105, and then reaches thenetwork access server 130 overlogical link 125. Thenetwork access server 130 is operable to relay the set of default credentials comprised in theaccess request 300 to theauthorization entity 160 in the form of amessage 325. - The
message 325 may be sent in accordance with a variety of protocols, including but not limited to RADIUS (Remote Authentication Dial In User Service). It should be understood that although themessage 325 may have a different format from theaccess request 300, it may nevertheless still be considered an access request in the generic sense of the expression. Theauthorization entity 160, which may be implemented in hardware, software, control logic or a combination thereof, implements a process that may comprise execution of background tasks, which can be interrupted under various circumstances. For example, in order to service themessage 325 from thenetwork access server 130, theauthorization entity 160 may execute the following steps. - Specifically, the
authorization entity 160 consults thedatabase 165 based on the set of credentials in themessage 325 in order to identify the entity responsible for managing a communication session initiated following the access request 300 (which can be thegateway 175, theconfiguration entity 145 or another “walled garden” gateway). Communication between theauthorization entity 160 and thedatabase 165 may take place using a variety of protocols, including but not limited to LDAP (Lightweight Directory Access Protocol). In the specific non-limiting example illustrated inFIG. 3 , the set of credentials in themessage 325 corresponds to the set of default credentials and therefore, according to thedatabase 165, the entity responsible for managing a communication session initiated following theaccess request 300 is theconfiguration entity 145. - The
authorization entity 160 then selects a logical identifier to be used by equipment for communication over logical link 125 (over which theaccess request 300 was received) during an eventual communication session. Alternatively, theauthorization entity 160 may involve another entity in the selection of this logical identifier. The selected logical identifier may be an Internet Protocol (IP) address, for example, such as an Ipv4 or Ipv6 address. Alternatively, the selected logical identifier may be a VLAN tag. In the specific non-limiting example illustrated inFIG. 3 , the selected logical identifier is 192.100.100.100. Adatabase 305 is provided that stores a mapping that relates logical links to logical identifiers selected to be used by equipment for communication over those logical links (such as, in this example, the relationship betweenlogical link 125 and logical identifier 192.100.100.100). Thedatabase 305 may be accessible to theauthorization entity 160 and/or to thenetwork access server 130. It should be appreciated that selection of the logical identifier for use by equipment for communication overlogical link 125 can be effected in a variety of ways, including selection from apool 315 of available logical identifiers. Other implementations are of course possible. - One will appreciate that once a given logical identifier is associated with a given logical link, it becomes possible to go one step further and associate that logical identifier with a DSLAM port, which is uniquely associated with a known service point location. Specifically, when the information stored in the
database 305 is combined with the information stored in thedatabase 135, one obtains an association between logical identifiers and ports of theDSLAM 110. This association or mapping can be stored in a location information database (LID) 310. In the specific non-limiting example ofFIG. 3 , thelocation information database 310 stores an association between IP address 192.100.100.100 and DSLAM port P1. Thelocation information database 310 is accessible to theconfiguration entity 145 for future use as will be described herein below. It should be appreciated that thelocation information database 310 may be created and maintained in a dynamic and transparent fashion, such that it always contains the most up-to-date information regarding the association between logical identifiers and DSLAM ports for specific service point locations. - Turning now to
FIGS. 4A and 4B , a “configuration session” is established between thecustomer premises equipment 200 and the entity whose identity was learned by having consulted the database 165 (in this case, the configuration entity 145). To this end, theauthorization entity 160 sends afirst message 400 to thecustomer premises equipment 200 to inform thecustomer premises equipment 200 of the logical identifier selected for use by equipment for communication over logical link 125 (in this case, 192.100.100.100). - In addition, as shown in
FIG. 4A , theauthorization entity 160 sends asecond message 405 to theconfiguration entity 145 to inform theconfiguration entity 145 of the logical identifier being used by the customer premises equipment 200 (in this case, 192.100.100.100), and thereby to engage it in communication with thecustomer premises equipment 200. - Alternatively, as shown in
FIG. 4B , thecustomer premises equipment 200 sends asecond message 410 to theconfiguration entity 145 to engage it in communication with thecustomer premises equipment 200. - In either case, and as shown in
FIG. 5 , aconfiguration session 500 is thus established between thecustomer premises equipment 200 and theconfiguration entity 145. - The
configuration entity 145 then consults thelocation information database 310 based on the logical identifier being used by thecustomer premises equipment 200, in order to obtain from thelocation information database 310 the identity of the associated DSLAM port. In the specific non-limiting example ofFIG. 5 , theconfiguration entity 145 consults thelocation information database 310 based on the logical identifier 192.100.100.100 in order to obtain from thelocation information database 310 the identity of port P1 of theDSLAM 110. In an alternative embodiment, theconfiguration entity 145 can perform a two-step process to obtain the same information, namely by accessing thedatabase 305 based on the logical identifier 192.100.100.100 in order to obtain the identity oflogical link 125, and then by accessing thedatabase 135 based on the identity oflogical link 125 in order to obtain the identity of port P1 of theDSLAM 110. - Next, the
configuration entity 145 sends a message to theactivation entity 155 that specifies the identity of port P1. Upon receipt of this message, theactivation entity 155 consults thedatabase 150 in order to identify the customer associated with port P1 of theDSLAM 110. In the specific non-limiting example ofFIG. 1 , theactivation entity 155 determines that customer ABC is associated with port P1 of theDSLAM 110. Moreover, theactivation entity 155 obtains from thedatabase 150 the set of customer account credentials “XYZ” associated with customer ABC. Theactivation entity 155 formulates a response message specifying the set of customer account credentials “XYZ”. Upon receipt of this response message, theconfiguration entity 145 sends its contents (i.e., the set of customer account credentials “XYZ”) to thecustomer premises equipment 200 as part of theconfiguration session 500. The configuration process now terminates. - Upon receipt of the set of customer account credentials “XYZ”, the
customer premises equipment 200 stores it in memory and uses it to make a second access request while thecustomer premises equipment 200 is still powered on. The result is now described with reference toFIG. 6 . - Specifically, the
customer premises equipment 200 issues asecond access request 600 comprising the set of customer account credentials “XYZ” stored at thecustomer premises equipment 200 and received during theconfiguration session 500. In accordance with various non-limiting embodiments, issuance of thesecond access request 600 can be triggered by the customer ABC (by virtue of accessing Internet using the computing device 215) or by thecustomer premises equipment 200. - The
second access request 600 reaches the DSLAM 110 (more specifically, port P1) over thephysical link 105, and then reaches thenetwork access server 130 overlogical link 125. Thenetwork access server 130 is operable to relay the set of customer account credentials “XYZ” comprised in thesecond access request 600 to theauthorization entity 160 in the form of amessage 605. - As with the
message 325, themessage 605 may be sent in accordance with a variety of protocols, including but not limited to RADIUS. Also, it should be understood that although themessage 605 may have a different format from thesecond access request 600, it may nevertheless still be considered an access request in the generic sense of the expression. Upon receipt of thequery message 605, theauthorization entity 160 consults thedatabase 165 based on the set of credentials in themessage 605 in order to identify the entity responsible for managing a communication session initiated following the second access request 600 (which, it is recalled, can be thegateway 175, theconfiguration entity 145 or another “walled garden” gateway). In the specific non-limiting example illustrated inFIG. 6 , the set of credentials in themessage 605 corresponds to the customer account credentials “XYZ” and therefore, according to thedatabase 165, the entity responsible for managing a communication session initiated following thesecond access request 600 is thegateway 175 to thepublic data network 170. - Optionally, the
authorization entity 160 may then assign (or may involve another entity in the assignment of) a new logical identifier tological link 125 over which thesecond access request 600 was received. The new logical identifier is stored in thedatabase 305 in association withlogical link 125. Alternatively, the same logical identifier as before (in this case, 192.100.100.100) may be used, in which case the previous step is not necessary. One will appreciate that if a new logical identifier is indeed selected to be used by equipment for communication over logical link 125 (which is itself associated with DSLAM port P1), then the association between such new logical identifier and port P1 can be automatically updated in thelocation information database 310. - Turning now to
FIGS. 7A and 7B , a “data session” is established between thecustomer premises equipment 200 and the entity whose identity was learned by having consulted the database 165 (in this case, the gateway 175). To this end, theauthorization entity 160 can send afirst message 700 to thecustomer premises equipment 200 to inform thecustomer premises equipment 200 of the logical identifier selected to be used by equipment for communication overlogical link 125. Where the selected logical address has not changed, the previous step may not be required. - In addition, as shown in
FIG. 7A , theauthorization entity 160 sends asecond message 705 to thegateway 175 to inform thegateway 175 of the logical identifier being used by the customer premises equipment 200 (in this case, 192.100.100.100), and thereby to engage it in communication with thecustomer premises equipment 200. - Alternatively, as shown in
FIG. 7B , thecustomer premises equipment 200 sends asecond message 710 to thegateway 175 to engage it in communication with thecustomer premises equipment 200. - In either case, and as shown in
FIG. 8 , adata session 800 is thus established between thecustomer premises equipment 200 and thegateway 175. - It will therefore be appreciated that customer ABC is not asked to enter the set of customer account credentials “XYZ”, as these are obtained by the
customer premises equipment 200 automatically as part of theconfiguration session 500, and stored at thecustomer premises equipment 200 for later use. However, even though this process has been automated, this does not make it less secure. Consider a malicious user who would intercept thecustomer premises equipment 200. Such a user would still not be able to gain access to thepublic data network 170 because the set of customer account credentials “XYZ” required to access thepublic data network 170 are derived from the service provider's own pre-determined knowledge of which service point location is connected to which DSLAM port. - In fact, any modem connected to the
physical link 105 leading to port P1 of theDSLAM 110 could be made to function seamlessly from 12 Main Street, provided it were initially programmed with the aforementioned set of default credentials. Recognition of this feature now allows customer ABC to employ third party customer premises equipment (e.g., a modem could be purchased from a source other than the service provider). In accordance with embodiments of the invention, such a modem would obtain the user account credentials for customer ABC merely by being connected to the service point location known by the service provider to be associated with customer ABC. - Moreover, since the configuration process is repeated when a new modem is powered up, there is no longer a danger that service would be refused due to an out-of-date association between the hardware identifier of a device and a given customer. This is because knowledge of the hardware identifier is not required in the embodiments described above. Naturally, it should be understood that associations based on hardware identifiers can still be useful as a supplement to the teachings herein, particularly for purposes other than the configuration process described above.
- It should further be appreciated that although the
first access request 300 was described as containing the set of default credentials, this is not a requirement of the present invention. Rather, in some embodiments, any type of access request, whether it contain a set of default credentials, a set of invalid credentials or no credentials at all, can be mapped indatabase 165 to an associated network entity, specifically theauthentication entity 145. The result would be the same, namely that theconfiguration session 500 would be established between thecustomer premises equipment 200 and theauthentication entity 145, and the set of customer account credentials “XYZ” would be transmitted to thecustomer premises equipment 200 over theconfiguration session 500 for transmission by thecustomer premises equipment 200 as part of thesecond access request 600. - In fact, it should further be appreciated that in some embodiments, the two-step process described above, involving (1) the first access request 300 (which, it has been established above, may or may not contain the set of default credentials) that causes establishment of the
configuration session 500 over which are exchanged the set of customer account credentials “XYZ” and (2) thesecond access request 600 that sends back the set of customer account credentials “XYZ” for establishment of thedata session 800, can be reduced to a one-step process with the same end effect of allowing thecustomer premises equipment 200 to access a desired resource such as thepublic data network 170. Specifically, theconfiguration session 500, and the delivery of the customer account credentials “XYZ” over theconfiguration session 500, can be dispensed with. This leads to the scenario where the knowledge of the DSLAM port associated with customer ABC residing at 12 Main Street serves implicitly as the customer account credentials for customer ABC. Specifically, when an access request is received via a port of the DSLAM 110 (containing any kind of credentials, valid or invalid, or no credentials at all), knowledge of the DSLAM port over which the access request was received allows identification of the customer (by consulting database 120), which would allow determination of the account credentials (by consulting database 150), which then allows determination of the network entity with which thecustomer premises equipment 200 should communicate (by consulting database 165). Thus, the customer premises equipment which issued the access request is automatically directed to the appropriate network entity with which a data session, rather than a configuration session, is established. It is to be noted that theauthentication entity 160 or an entity on behalf thereof can still be involved, as previously described, in the selection of a logical identifier (e.g., IP address) to be used by the equipment for communication over the logical link 125 (over which the access request was received). - Those skilled in the art will appreciate that in some embodiments, groups of two or more of the various network entities (e.g., the
configuration entity 145, theauthorization entity 160, theactivation entity 155, etc.) may be collocated in a single physical component or piece of equipment. By the same token, the functionality of individual ones of the various network entities (e.g., theconfiguration entity 145, theauthorization entity 160, theactivation entity 155, etc.) may be distributed over two or more physical components or pieces of equipment. - Those skilled in the art will also appreciate that in some embodiments, some or all of the functionality of the various network entities (e.g., the
configuration entity 145, theauthorization entity 160, theactivation entity 155, etc.) may be implemented using pre-programmed hardware or firmware elements (e.g., application specific integrated circuits (ASICs), electrically erasable programmable read-only memories (EEPROMs), etc.), or other related components. In other embodiments, some or all of the functionality of the various network entities may be achieved using a computing apparatus that has access to a code memory (not shown) which stores computer-readable program code for operation of the computing apparatus, in which case the computer-readable program code could be stored on a medium which is fixed, tangible and readable directly by the various network entities, (e.g., removable diskette, CD-ROM, ROM, fixed disk, USB drive), or the computer-readable program code could be stored remotely but transmittable to the various network entities via a modem or other interface device (e.g., a communications adapter) connected to a network (including, without limitation, the Internet) over a transmission medium, which may be either a non-wireless medium (e.g., optical or analog communications lines) or a wireless medium (e.g., microwave, infrared or other transmission schemes) or a combination thereof. - While specific embodiments of the present invention have been described and illustrated, it will be apparent to those skilled in the art that numerous modifications and variations can be made without departing from the scope of the invention as defined in the appended claims.
Claims (76)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CA2007/001556 WO2009030012A1 (en) | 2007-09-04 | 2007-09-04 | Method and system for provisioning customer premises equipment |
CAPCT/CA2007/001556 | 2007-09-04 |
Publications (2)
Publication Number | Publication Date |
---|---|
US20090063689A1 true US20090063689A1 (en) | 2009-03-05 |
US8346940B2 US8346940B2 (en) | 2013-01-01 |
Family
ID=40409237
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/204,605 Active 2029-07-19 US8346940B2 (en) | 2007-09-04 | 2008-09-04 | Method and system for provisioning customer premises equipment |
Country Status (3)
Country | Link |
---|---|
US (1) | US8346940B2 (en) |
CA (1) | CA2638683C (en) |
WO (1) | WO2009030012A1 (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011160812A1 (en) * | 2010-06-21 | 2011-12-29 | Deutsche Telekom Ag | Method for efficient initialization of a telecommunications network and telecommunications network |
WO2011160810A1 (en) * | 2010-06-21 | 2011-12-29 | Deutsche Telekom Ag | Method and system for efficient use of a telecommunications network and the connection between the telecommunications network and a customer premises equipment |
EP2583414A1 (en) * | 2010-06-21 | 2013-04-24 | Deutsche Telekom AG | Method and system for efficient management of a telecommunications network and the connection between the telecommunications network and a customer premises equipment |
EP2583413A1 (en) * | 2010-06-21 | 2013-04-24 | Deutsche Telekom AG | Method and system for efficient use of a telecommunication network and the connection between the telecommunications network and a customer premises equipment |
US20150033308A1 (en) * | 2013-07-23 | 2015-01-29 | Pace Plc | Auto-correcting credentials for network subscriber equipment |
US20160204956A1 (en) * | 2013-09-09 | 2016-07-14 | British Telecommunications Plc | Method and apparatus for communicating with an access node |
US10680843B2 (en) | 2016-12-21 | 2020-06-09 | British Telecommunications Public Limited Company | Network node |
US10892965B2 (en) | 2013-09-30 | 2021-01-12 | British Telecommunications Public Limited Company | Data network management |
US11050756B2 (en) * | 2019-09-04 | 2021-06-29 | Koninklijke Kpn N.V. | Controlling network access of customer-premises equipment |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2887577B1 (en) * | 2013-12-20 | 2020-02-19 | Deutsche Telekom AG | Method for establishing and/or configuring an internet protocol network connection between a customer premises equipment and a telecommunications network |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6553029B1 (en) * | 1999-07-09 | 2003-04-22 | Pmc-Sierra, Inc. | Link aggregation in ethernet frame switches |
US20040034797A1 (en) * | 2002-06-18 | 2004-02-19 | Becker Hof Onno Mark | Domain-less service selection |
US20040258028A1 (en) * | 2003-06-23 | 2004-12-23 | Telefonaktiebolaget L M Ericsson (Publ) | Method and wireless local area network (WLAN) access point controller (APC) for translating data frames |
US20050021703A1 (en) * | 2003-06-04 | 2005-01-27 | Cherry Darrel D. | Systems and methods for automatically configuring a client for remote use of a network-based service |
US20050190892A1 (en) * | 2004-02-27 | 2005-09-01 | Dawson Martin C. | Determining the geographical location from which an emergency call originates in a packet-based communications network |
US20060028980A1 (en) * | 2004-08-06 | 2006-02-09 | Wright Steven Allan | Methods, systems, and computer program products for managing admission control in a regional/access network based on user preferences |
US20070076607A1 (en) * | 2005-09-14 | 2007-04-05 | Cisco Technology, Inc. | Quality of service based on logical port identifier for broadband aggregation networks |
US20070186113A1 (en) * | 2006-02-06 | 2007-08-09 | Cuberson Russel D | Methods, DSL modems, and computer program products for provisioning DSL service using downloaded username/password |
US20070214270A1 (en) * | 2006-03-08 | 2007-09-13 | Luc Absillis | Triggering DHCP actions from IEEE 802.1x state changes |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8576832B2 (en) | 2005-03-29 | 2013-11-05 | At&T Intellectual Property Ii | Method and apparatus for enabling global telephony capabilities in communication networks |
WO2008070952A1 (en) | 2006-12-14 | 2008-06-19 | Bce Inc | Method, system and apparatus for provisioning a communication client |
-
2007
- 2007-09-04 CA CA2638683A patent/CA2638683C/en active Active
- 2007-09-04 WO PCT/CA2007/001556 patent/WO2009030012A1/en active Application Filing
-
2008
- 2008-09-04 US US12/204,605 patent/US8346940B2/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6553029B1 (en) * | 1999-07-09 | 2003-04-22 | Pmc-Sierra, Inc. | Link aggregation in ethernet frame switches |
US20040034797A1 (en) * | 2002-06-18 | 2004-02-19 | Becker Hof Onno Mark | Domain-less service selection |
US20050021703A1 (en) * | 2003-06-04 | 2005-01-27 | Cherry Darrel D. | Systems and methods for automatically configuring a client for remote use of a network-based service |
US20040258028A1 (en) * | 2003-06-23 | 2004-12-23 | Telefonaktiebolaget L M Ericsson (Publ) | Method and wireless local area network (WLAN) access point controller (APC) for translating data frames |
US20050190892A1 (en) * | 2004-02-27 | 2005-09-01 | Dawson Martin C. | Determining the geographical location from which an emergency call originates in a packet-based communications network |
US20060028980A1 (en) * | 2004-08-06 | 2006-02-09 | Wright Steven Allan | Methods, systems, and computer program products for managing admission control in a regional/access network based on user preferences |
US20070076607A1 (en) * | 2005-09-14 | 2007-04-05 | Cisco Technology, Inc. | Quality of service based on logical port identifier for broadband aggregation networks |
US20070186113A1 (en) * | 2006-02-06 | 2007-08-09 | Cuberson Russel D | Methods, DSL modems, and computer program products for provisioning DSL service using downloaded username/password |
US20070214270A1 (en) * | 2006-03-08 | 2007-09-13 | Luc Absillis | Triggering DHCP actions from IEEE 802.1x state changes |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9413829B2 (en) | 2010-06-21 | 2016-08-09 | Deutsche Telekom Ag | Method for efficient initialization of a telecommunications network and telecommunications network |
WO2011160810A1 (en) * | 2010-06-21 | 2011-12-29 | Deutsche Telekom Ag | Method and system for efficient use of a telecommunications network and the connection between the telecommunications network and a customer premises equipment |
CN103039040A (en) * | 2010-06-21 | 2013-04-10 | 德国电信股份公司 | Method for efficient initialization of a telecommunications network and telecommunications network |
EP2583414A1 (en) * | 2010-06-21 | 2013-04-24 | Deutsche Telekom AG | Method and system for efficient management of a telecommunications network and the connection between the telecommunications network and a customer premises equipment |
EP2583413A1 (en) * | 2010-06-21 | 2013-04-24 | Deutsche Telekom AG | Method and system for efficient use of a telecommunication network and the connection between the telecommunications network and a customer premises equipment |
JP2013534104A (en) * | 2010-06-21 | 2013-08-29 | ドイチェ テレコム アクチエンゲゼルシャフト | Telecommunication network and method and system for efficient management of connection between telecommunication network and customer premises equipment |
JP2013534767A (en) * | 2010-06-21 | 2013-09-05 | ドイチェ テレコム アクチエンゲゼルシャフト | Telecommunications network, method and system for efficiently using a connection between the telecommunications network and customer premises equipment |
JP2013535152A (en) * | 2010-06-21 | 2013-09-09 | ドイチェ テレコム アクチエンゲゼルシャフト | Method for efficient initialization of a telecommunication network and telecommunication network |
WO2011160812A1 (en) * | 2010-06-21 | 2011-12-29 | Deutsche Telekom Ag | Method for efficient initialization of a telecommunications network and telecommunications network |
US9032083B2 (en) * | 2010-06-21 | 2015-05-12 | Deutsche Telekom Ag | Method and system for efficient use of a telecommunications network and the connection between the telecommunications network and a customer premises equipment |
US20150033308A1 (en) * | 2013-07-23 | 2015-01-29 | Pace Plc | Auto-correcting credentials for network subscriber equipment |
US9729546B2 (en) * | 2013-07-23 | 2017-08-08 | Arris Global Ltd. | Auto-correcting credentials for network subscriber equipment |
US20160204956A1 (en) * | 2013-09-09 | 2016-07-14 | British Telecommunications Plc | Method and apparatus for communicating with an access node |
US9667436B2 (en) * | 2013-09-09 | 2017-05-30 | British Telecommunications Public Limited Company | Method and apparatus for communicating with an access node |
US10892965B2 (en) | 2013-09-30 | 2021-01-12 | British Telecommunications Public Limited Company | Data network management |
US10680843B2 (en) | 2016-12-21 | 2020-06-09 | British Telecommunications Public Limited Company | Network node |
US11050756B2 (en) * | 2019-09-04 | 2021-06-29 | Koninklijke Kpn N.V. | Controlling network access of customer-premises equipment |
Also Published As
Publication number | Publication date |
---|---|
CA2638683C (en) | 2013-09-03 |
CA2638683A1 (en) | 2009-03-04 |
US8346940B2 (en) | 2013-01-01 |
WO2009030012A1 (en) | 2009-03-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8346940B2 (en) | Method and system for provisioning customer premises equipment | |
CN105991796B (en) | A kind of method and system of the configuration service of the user terminal in on-premise network | |
US8984141B2 (en) | Server for routing connection to client device | |
EP1760950B1 (en) | A method for distributing the service according to the type of the terminal | |
US7934014B2 (en) | System for the internet connections, and server for routing connections to a client machine | |
US9154378B2 (en) | Architecture for virtualized home IP service delivery | |
US7991913B2 (en) | Method for domain name configuration in IPv6 access network and the network device hereof | |
US10659430B2 (en) | Systems and methods for dynamic network address modification related applications | |
US6684243B1 (en) | Method for assigning a dual IP address to a workstation attached on an IP data transmission network | |
CN101064714B (en) | Service dispensing method | |
US20030033379A1 (en) | Intelligent central directory for soft configuration of IP services | |
US20150188769A1 (en) | Method and device thereof for automatically finding and configuring virtual network | |
US20120226740A1 (en) | System and method to provide remote device management for mobile virtualized platforms | |
US10200233B2 (en) | Dynamic account updating | |
TW201141126A (en) | Apparatus and methods for managing network resources | |
JP3996922B2 (en) | Centralized management system and method for network connection means in a network where different communication protocols coexist | |
US10791464B2 (en) | Method for establishing a secure connection | |
JP2013534767A (en) | Telecommunications network, method and system for efficiently using a connection between the telecommunications network and customer premises equipment | |
CN106656566B (en) | Third-party data source authentication network-accessing management method based on LDAP protocol | |
KR20070024116A (en) | System for managing network service connection based on terminal aucthentication | |
EP2887577B1 (en) | Method for establishing and/or configuring an internet protocol network connection between a customer premises equipment and a telecommunications network | |
CN112448945A (en) | Controlling network access of customer premises equipment | |
KR101893209B1 (en) | Apparatus, method and system for providing of IP communication service | |
CN108306807A (en) | Management method of opening an account and device | |
CN111917858B (en) | Remote management system, method, device and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: BCE INC., CANADA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CAMILLE, JEAN-PAUL;TIN, NOEL TAI-TUNG;CHAN, FRANK SIU HONG;REEL/FRAME:021483/0906;SIGNING DATES FROM 20080214 TO 20080220 Owner name: BCE INC., CANADA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CAMILLE, JEAN-PAUL;TIN, NOEL TAI-TUNG;CHAN, FRANK SIU HONG;SIGNING DATES FROM 20080214 TO 20080220;REEL/FRAME:021483/0906 |
|
AS | Assignment |
Owner name: BCE INC., CANADA Free format text: CHANGE OF ADDRESS OF ASSIGNEE;ASSIGNOR:BCE INC.;REEL/FRAME:029381/0879 Effective date: 20121129 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FEPP | Fee payment procedure |
Free format text: 7.5 YR SURCHARGE - LATE PMT W/IN 6 MO, LARGE ENTITY (ORIGINAL EVENT CODE: M1555); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |